National Science Library of Georgia

Image from Google Jackets

Secure multiparty computation : an information-theoretic approach / Ronald Cramer, Centrum Wiskunde & Informatica, Ivan Damgaard, Aarhus University, Jesper Buus Nielsen, Aarhus University.

By: Contributor(s): Material type: TextTextPublisher: Cambridge : Cambridge University Press, 2015Description: 1 online resource (x, 373 pages) : digital, PDF file(s)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781107337756 (ebook)
Other title:
  • Secure Multiparty Computation & Secret Sharing
Subject(s): Additional physical formats: Print version: : No titleDDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59 .C685 2015
Online resources: Summary: In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the information. The authors present basic feasibility results from the last 30 years, generalizations to arbitrary access structures using linear secret sharing, some recent techniques for efficiency improvements, and a general treatment of the theory of secret sharing, focusing on asymptotic results with interesting applications related to MPC.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Title from publisher's bibliographic system (viewed on 05 Oct 2015).

In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the information. The authors present basic feasibility results from the last 30 years, generalizations to arbitrary access structures using linear secret sharing, some recent techniques for efficiency improvements, and a general treatment of the theory of secret sharing, focusing on asymptotic results with interesting applications related to MPC.

There are no comments on this title.

to post a comment.
Copyright © 2023 Sciencelib.ge All rights reserved.